TY - BOOK A1 - Laack, Walter van T1 - Greater Than the Entire Universe Y1 - 2022 SN - 978-3-936624-52-6 PB - van Laack GmbH CY - Aachen ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - A new model for the description of the heat transfer for plane thermo-active geotechnical systems based on thermal resistances JF - Acta Geotechnica Y1 - 2015 U6 - https://doi.org/10.1007/s11440-014-0311-6 SN - 1861-1133 VL - 10 IS - 2 SP - 219 EP - 229 PB - Springer CY - Berlin ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - Design of plane energy geostructures based on laboratory tests and numerical modelling JF - Energy and Buildings Y1 - 2015 U6 - https://doi.org/10.1016/j.enbuild.2015.08.039 SN - 0378-7788 VL - 107 SP - 434 EP - 444 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Küppers, Tobias A1 - Steffen, Victoria A1 - Hellmuth, Hendrik A1 - O'Connell, Timothy A1 - Bongaerts, Johannes A1 - Maurer, Karl-Heinz A1 - Wiechert, Wolfgang T1 - Developing a new production host from a blueprint: Bacillus pumilus as an industrial enzyme producer JF - Microbial cell factories Y1 - 2014 U6 - https://doi.org/10.1186/1475-2859-13-46 SN - 1475-2859 (E-Journal) VL - 13 SP - Article No. 46 PB - BioMed Central CY - London ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - https://doi.org/10.1145/3600160.3605167 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. Article No.: 87 SP - 1 EP - 7 PB - ACM ER - TY - CHAP A1 - Kümmell, Steffen A1 - Hillgärtner, Michael T1 - Inductive charging comfortable and nonvisible charging stations for urbanised areas T2 - E-Mobility in Europe : trends and good practice N2 - For a wide acceptance of E-Mobility, a well-developed charging infrastructure is needed. Conductive charging stations, which are today’s state of the art, are of limited suitability for urbanised areas, since they cause a significant diversification in townscape. Furthermore, they might be destroyed by vandalism. Besides for those urbanistic reasons, inductive charging stations are a much more comfortable alternative, especially in urbanised areas. The usage of conductive charging stations requires more or less bulky charging cables. The handling of those standardised charging cables, especially during poor weather conditions, might cause inconvenience, such as dirty clothing etc. Wireless charging does not require visible and vandalism vulnerable charge sticks. No wired connection between charging station and vehicle is needed, which enable the placement below the surface of parking spaces or other points of interest. Inductive charging seems to be the optimal alternative for E-Mobility, as a high power transfer can be realised with a manageable technical and financial effort. For a well-accepted and working public charging infrastructure in urbanised areas it is essential that the infrastructure fits the vehicles’ needs. Hence, a well-adjusted standardisation of the charging infrastructure is essential. This is carried out by several IEC (International Electrotechnical Commission) and national standardisation committees. To ensure an optimised technical solution for future’s inductive charging infrastructures, several field tests had been carried out and are planned in near future. KW - E-mobility KW - Inductive charging KW - Charging stations KW - Urban areas Y1 - 2015 SN - 978-3-319-13193-1 U6 - https://doi.org/10.1007/978-3-319-13194-8_16 SP - 297 EP - 309 PB - Springer CY - Cham [u.a.] ER - TY - JOUR A1 - Kühn, Raoul-Roman A1 - Haugner, Werner A1 - Staat, Manfred A1 - Sponagel, Stefan T1 - A Two Phase Mixture Model based on Bone Observation N2 - An optimization method is developed to describe the mechanical behaviour of the human cancellous bone. The method is based on a mixture theory. A careful observation of the behaviour of the bone material leads to the hypothesis that the bone density is controlled by the principal stress trajectories (Wolff’s law). The basic idea of the developed method is the coupling of a scalar value via an eigenvalue problem to the principal stress trajectories. On the one hand this theory will permit a prediction of the reaction of the biological bone structure after the implantation of a prosthesis, on the other hand it may be useful in engineering optimization problems. An analytical example shows its efficiency. KW - Knochen KW - Knochenbildung KW - Knochenchirugie KW - Strukturanalyse KW - Schwammknochen KW - Knochendichte KW - Wolffsches Gesetz KW - bone structure KW - bone density KW - Wolff's Law KW - cancellous bone Y1 - 2004 ER - TY - CHAP A1 - Kötter, Jens A1 - Decker, Stefan A1 - Detzler, Raphael A1 - Schäfer, Jochen A1 - Schmitz, Mark A1 - Herrmann, Ulf T1 - Cost Reduction of Solar Fields with HelioTrough Collector Y1 - 2012 N1 - Concentration Solar Power and Chemical Energy Systemes : SolarPaces 2012, September 11 14 2002, Marrakesh, Morroco PB - FLAGSOL CY - Köln ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - Cybersecurity awareness training provided by the competence developing game GHOST T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game KW - Awareness KW - CDG KW - Serious Game KW - tablet game KW - business simulation Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 81 EP - 87 ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - A new definition of competence developing games - and a framework to assess them T2 - ACHI 2016 : The Ninth International Conference on Advances in Computer-Human Interactions N2 - There are different types of games that try to make use of the motivation of a gaming situation in learning contexts. This paper introduces the new terminology ‘Competence Developing Game’ (CDG) as an umbrella term for all games with this intention. Based on this new terminology, an assessment framework has been developed and validated in scope of an empirical study. Now, all different types of CDGs can be evaluated according to a defined and uniform set of assessment criteria and, thus, are comparable according to their characteristics and effectiveness. KW - Serious Games KW - Gamification KW - Business Simulations KW - Assessment Y1 - 2016 SN - 978-1-61208-468-8 N1 - Proceeding of the Ninth International Conference on Advances in Computer-Human Interactions (ACHI 2016), Venice. SP - 95 EP - 97 ER - TY - JOUR A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training JF - International Journal on Advances in Security N2 - To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown. Y1 - 2018 SN - 1942-2636 VL - 11 IS - 3 & 4 SP - 274 EP - 287 PB - IARIA Journals ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin R. ED - Stephanidis, C. T1 - The pyramid assessment framework for ‘competence developing games’ T2 - Communications in Computer and Information Science Y1 - 2016 SN - 978-331940541-4 U6 - https://doi.org/10.1007/978-3-319-40542-1_37 SN - 1865-0929 N1 - 18th International Conference on Posters’ Extended Abstracts, HCI International 2016; Toronto; Canada; 17 July 2016 through 22 July 2016 VL - 618 SP - 232 EP - 237 PB - Springer ER - TY - CHAP A1 - König, Johannes Alexander A1 - Völker, Veronika A1 - Wolf, Martin R. T1 - The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game’s story T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - During the development of a Competence Developing Game’s (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG’s target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories. KW - Competence Developing Game KW - Serious Game KW - Video Game KW - Story KW - Player Types Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 98 EP - 106 ER - TY - CHAP A1 - Köllensperger, P. A1 - Bragard, Michael A1 - Plum, T. A1 - De Doncker, R. W. T1 - The dual GCT : a new high-power device using optimized GCT technology T2 - Conference record of the 2007 IEEE Industry Applications Conference : 42. IAS annual meeting ; September 23 - 27, 2007, New Orleans, Louisiana, USA Y1 - 2007 SN - 978-1-4244-1260-0 (Online) SN - 978-1-4244-1259-4 (Print) U6 - https://doi.org/10.1109/07IAS.2007.76 SP - 358 EP - 365 PB - IEEE Operations Center CY - Piscataway, NJ ER - TY - JOUR A1 - Köllensperger, P. A1 - Bragard, Michael A1 - Plum, T. A1 - De Doncker, R. W. T1 - The dual GCT : new high-power device using optimized GCT technology JF - IEEE transactions on industry applications Y1 - 2009 U6 - https://doi.org/10.1109/TIA.2009.2027364 SN - 0093-9994 VL - 45 IS - 5 SP - 1754 EP - 1762 ER - TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin R. T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - https://doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER - TY - JOUR A1 - Köhler, Klemens T1 - A conflict theory perspective of IT attacks – consequences for IT security education N2 - Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games. Y1 - 2020 IS - Preprint ER - TY - JOUR A1 - Kämper, Klaus-Peter A1 - Schulz, C. A1 - Ehrfeld, W. A1 - Erbel, R. T1 - LIGA Fabricated Microsystems for Medical and Related Applications. Schulz, C.; Ehrfeld, W.; Erbel, R.; Kämper, K.-P.; Koch, L.; Lehr, H.; Roth, T. JF - 3-Day Course on Microengineering in Medicine and Biology and its Applications to Minimally Invasive Techniques for Therapy and Medical Diagnosis : EURO-BME 94; October 5, 6, and 7, 1994, Swiss Federal Institute of Technology, EPFL, Lausanne, Switzerland / [the 1994 EURO-BME Microengineering in Medicine and Biology Training Course. Staff: Christian D. Depeursinge ...] Y1 - 1994 N1 - Microengineering in Medicine and Biology Training Course 1994, Lausanne PB - REPRO EPFL CY - Lausanne ER - TY - JOUR A1 - Kämper, Klaus-Peter A1 - Schmitt, W. A1 - Wesner, D. A. A1 - Güntherodt, G. T1 - Thickness dependence of the spin- and angle-resolved photoemission of ultrathin, epitaxial Ni(111)/W(110) layers JF - Applied Physics A: Materials Science and Processing. 49 (1989), H. 6 Y1 - 1989 SN - 1432-0630 SP - 573 EP - 578 ER - TY - JOUR A1 - Kämper, Klaus-Peter A1 - Schmitt, W. A1 - Güntherodt, G. A1 - Gambino, R. J. T1 - CrO2—A New Half-Metallic Ferromagnet? Kämper, K.-P.; Schmitt, W.; Güntherodt, G.; Gambino, R. J., Ruf, R. JF - Physical Review Letters. 59 (1987), H. 24 Y1 - 1987 SN - 1079-7114 SP - 2788 EP - 2791 ER -